Investigation of Ensemble Learning Approach for Early Detection of Traffic from Tor Browser DOI

Ankita Kumari,

Ishu Sharma

Published: Nov. 16, 2023

In this research paper, ensemble learning is used to create a new paradigm for network security. This study's main goal detect and prevent malicious communication from entering setups, in the campus area The dark web, often known as "dark net," an encrypted portion of internet that cannot be accessed without specific permission or settings not included search engine results. People need privacy do soon web totally lawful reasons, despite fact it depicted space utilized by criminal groups, such transmission secret company information political activists. order secure user identity ensure anonymity, net encryption technology transmits users' data via huge number intermediary servers. Tor Browser browser created with increasing online anonymity. It based on network, decentralized system volunteer-run servers routes infrastructure across several nodes obfuscate user's IP address make challenging monitor their activity. may provide full security against all dangers. study enhances safety application advanced machine learning. Through detection possible flaws trend analysis use, aims improve Several different methods are combined assess intricate traffic patterns. With ability quickly identify deviations standard, computer can fake facilitate proactive intervention. great degree precision demonstrated its efficacy. techniques might employed protect open networks attacks improved study.

Language: Английский

Imbalance in spatiotemporal analysis of narcotics-related activities: a bibliometric review DOI Creative Commons
Razik Ridzuan Mohd Tajuddin, Noriszura Ismail, Mohammad Rahim Kamaluddin

et al.

Humanities and Social Sciences Communications, Journal Year: 2025, Volume and Issue: 12(1)

Published: Feb. 15, 2025

Language: Английский

Citations

0

Cybercrime through the public lens: a longitudinal analysis DOI Creative Commons
Krishnashree Achuthan,

Sugandh Khobragade,

Robin M. Kowalski

et al.

Humanities and Social Sciences Communications, Journal Year: 2025, Volume and Issue: 12(1)

Published: March 1, 2025

Language: Английский

Citations

0

Weaponization of the Growing Cybercrimes inside the Dark Net: The Question of Detection and Application DOI Creative Commons
Amr Adel, Mohammad Norouzifard

Big Data and Cognitive Computing, Journal Year: 2024, Volume and Issue: 8(8), P. 91 - 91

Published: Aug. 14, 2024

The Dark Web is a subset of the Deep Web, requiring special browsers, Net refers to encrypted networks, encompasses non-indexed online content, and darknet includes unused IP address networks. has become hotbed cybercrime, with individuals groups using anonymity encryption provided by network carry out range criminal activities. One most concerning trends in recent years been weaponization cybercrimes, as criminals use their technical skills create tools techniques that can be used launch attacks against individuals, businesses, governments. This paper examines cybercrimes on Net, focusing question detection application. uses Systematic Literature Review (SLR) method appraise examine crimes consequences identify future measures reduce crime threats. Data from 88 relevant articles 2011 2023 were extracted synthesized, along latest data 2024 answer research questions, providing comprehensive knowledge growing crimes; assessing social, economic, ethical impacts; analyzing established methods locate apprehend criminals.

Language: Английский

Citations

1

Understanding the Nature of the Transnational Scam-Related Fraud: Challenges and Solutions from Vietnam’s Perspective DOI Creative Commons
Hai Thanh Luong, Hung Q. Ngo

Laws, Journal Year: 2024, Volume and Issue: 13(6), P. 70 - 70

Published: Nov. 21, 2024

Practical challenges and special threats from scam-related fraud exist for regional local communities in Southeast Asia during after the COVID-19 pandemic. The rise pig-butchering operations is a major concern due to increased use of digital technology online financial transactions. Many these are linked organized crime syndicates operating across borders, posing law enforcement. As first study Vietnam, we combined primary secondary databases unveil nature transnational fraud. Findings show that scammers using advanced methods such as phishing, fraudulent investments, identity theft maximize their sophisticated tactics achieving possession. There rings Vietnam Cambodia, with Chinese groups playing leading role behind scenes. Social media its various applications have become common platforms criminal activities. This also calls practical recommendations consider specific combating crimes, including building strong framework clear policies, encouraging multiple educational awareness campaigns communities, enhancing effective cooperation among enforcement others, supporting evidence-based approaches research application. While recognized assumed complex problem requires well-rounded coordinated response, exact approach would depend on each country’s circumstances.

Language: Английский

Citations

1

Darknet Traffic Classification Using Machine Learning DOI

Phenphitcha Pookpun,

Somkiat Kosolsombat,

Taweewat Luangwiriya

et al.

Published: March 29, 2024

The Darknet is an overlay network that difficult to access. It requires special software prevent tracking by Internet Service Providers (ISP) and malicious actors. often associated with illegal activities. Therefore, a study was conducted on classifying Traffic using Machine Learning detect user behaviors identify potentially harmful CIC-Darknet2020 dataset utilized, comprising 8 classes of behavior. Browsing, Chat, Email, File-Transfer, P2P, Audio, Video, VoIP. Due the dataset's imbalance, SMOTE ADASYN techniques were employed. After applying Learning, it observed Random Forest achieved highest accuracy in all experiments, reaching up 93.1%.

Language: Английский

Citations

0

Investigation of Ensemble Learning Approach for Early Detection of Traffic from Tor Browser DOI

Ankita Kumari,

Ishu Sharma

Published: Nov. 16, 2023

In this research paper, ensemble learning is used to create a new paradigm for network security. This study's main goal detect and prevent malicious communication from entering setups, in the campus area The dark web, often known as "dark net," an encrypted portion of internet that cannot be accessed without specific permission or settings not included search engine results. People need privacy do soon web totally lawful reasons, despite fact it depicted space utilized by criminal groups, such transmission secret company information political activists. order secure user identity ensure anonymity, net encryption technology transmits users' data via huge number intermediary servers. Tor Browser browser created with increasing online anonymity. It based on network, decentralized system volunteer-run servers routes infrastructure across several nodes obfuscate user's IP address make challenging monitor their activity. may provide full security against all dangers. study enhances safety application advanced machine learning. Through detection possible flaws trend analysis use, aims improve Several different methods are combined assess intricate traffic patterns. With ability quickly identify deviations standard, computer can fake facilitate proactive intervention. great degree precision demonstrated its efficacy. techniques might employed protect open networks attacks improved study.

Language: Английский

Citations

0